International Development

FSI researchers consider international development from a variety of angles. They analyze ideas such as how public action and good governance are cornerstones of economic prosperity in Mexico and how investments in high school education will improve China’s economy.

They are looking at novel technological interventions to improve rural livelihoods, like the development implications of solar power-generated crop growing in Northern Benin.

FSI academics also assess which political processes yield better access to public services, particularly in developing countries. With a focus on health care, researchers have studied the political incentives to embrace UNICEF’s child survival efforts and how a well-run anti-alcohol policy in Russia affected mortality rates.

FSI’s work on international development also includes training the next generation of leaders through pre- and post-doctoral fellowships as well as the Draper Hills Summer Fellows Program.

Paragraphs

Motivated by the difficulty of biometric systems to correctly match fingerprints with poor image quality, we formulate and solve a game-theoretic formulation of the identification problem in two settings: U.S. visa applicants are checked against a list of visa holders to detect visa fraud, and visitors entering the U.S. are checked against a watchlist of criminals and suspected terrorists. For three types of biometric strategies, we solve the game in which the U.S. Government chooses the strategy's optimal parameter values to maximize the detection probability subject to a constraint on the mean biometric processing time per legal visitor, and then the terrorist chooses the image quality to minimize the detection probability. At current inspector staffing levels at ports of entry, our model predicts that a quality-dependent two-finger strategy achieves a detection probability of 0.733, compared to 0.526 under the quality-independent two-finger strategy that is currently implemented at the U.S. border. Increasing the staffing level of inspectors offers only minor increases in the detection probability for these two strategies. Using more than two fingers to match visitors with poor image quality allows a detection probability of 0.949 under current staffing levels, but may require major changes to the current U.S. biometric program. The detection probabilities during visa application are {approx}11-22% smaller than at ports of entry for all three strategies, but the same qualitative conclusions hold.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Proceedings of the National Academy of Sciences
Authors
Lawrence M. Wein
-

Despite the increasing centrality of computer software in modern weapons systems, computing remains relatively underrepresented in public debates about weapons policy. For example, in 1991, a software glitch in the Patriot missile defense system killed 28 people, yet physicists remain the most prominent technical critics of this system. This talk suggests that the different patterns of political intervention exhibited by physicists and computer experts cannot be explained by technical relevance. It suggests alternate explanations by examining the processes by which technical judgments are generated and rendered authoritative in the political arena, using insights from science and technology studies. These processes are then illustrated by comparing how computer experts and physicists intervened in political controversy about the feasibility of 'Star Wars', President Ronald Reagan's proposal to develop a missile defense that would render the massive Soviet nuclear arsenal 'impotent and obsolete.' I compare how critical groups of physicists and computer professionals attempted to persuade the public that a perfect missile shield could not be built. This analysis suggests that sharp differences in the two groups' technical frames of analysis, rhetoric, and professional organizations all contributed to the physicists' ability to demonstrate a much higher level of consensus and authority in the political arena.

Reuben W. Hills Conference Room

0
Affiliate
slayton_headshot.jpg PhD

Slayton’s research and teaching examine the relationships between and among risk, governance, and expertise, with a focus on international security and cooperation since World War II. Slayton’s current book project, Shadowing Cybersecurity, examines the historical emergence of cybersecurity expertise. Shadowing Cybersecurity shows how efforts to establish credible expertise in corporate, governmental, and non-governmental contexts have produced varying and sometimes conflicting expert practices. Nonetheless, all cybersecurity experts wrestle with the irreducible uncertainties that characterize intelligent adversaries, and the fundamental inability to prove that systems are secure. The book shows how cybersecurity experts have paradoxically gained credibility by making threats and vulnerabilities visible, while acknowledging that more always remain in the shadows.

Slayton’s first book, Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012 (MIT Press, 2013), shows how the rise of a new field of expertise in computing reshaped public policies and perceptions about the risks of missile defense in the United States. In 2015, Arguments that Count won the Computer History Museum Prize. In 2016, Slayton was awarded a National Science Foundation CAREER grant for her project “Enacting Cybersecurity Expertise.” In 2019, Slayton was also a recipient of the United States Presidential Early Career Award for Scientists and Engineers, for her NSF CAREER project.

CV
Date Label
Rebecca Slayton Science Fellow CISAC
Seminars
-

Reuben W. Hills Conference Room, East 207, Encina Hall

James J. Wirtz
Seminars
-

While U.S. policy is focused on defending against a mass-effect bioterrorism attack, we may be missing a lower-tech threat of much higher probability. The path from the "street chemistry" of improvised explosive devices (IEDs) to improvised chemical devices (ICDs) is very short. Whereas the path from IEDs to effectively weaponized, transgenic biological agents is a substantial leap for states and, even more so, for non-state actors. Examining the rising interest in highly portable, easily assembled improvised devices incorporating commercial and research chemicals by non-state actors, principally radical Islamists, this work considers the threat of improvised chemical terrorism within a comprehensive WMD risk framework.

Reuben W. Hills Conference Room, East 207, Encina Hall

Margaret E. Kosal
Seminars
Authors
William J. Perry
News Type
Commentary
Date
Paragraphs
"Of the Pentagon's $419.3 billion budget request for next year, only about $10.5 billion--2 percent--will go toward basic research, applied research and advanced technology development," write %people1% and John M. Deutch, former secretary and assistant secretary of defense, respectively, in a New York Times op-ed. This 20 percent reduction will weaken national security in the long run, they warn, adding, "Secretary of Defense Donald Rumsfeld should reconsider this request, and if he does not, Congress should restore the cut."

Of the Pentagon's $419.3 billion budget request for next year, only about $10.5 billion - 2 percent - will go toward basic research, applied research and advanced technology development. This represents a 20 percent reduction from last year, a drastic cutback that threatens the long-term security of the nation. Secretary of Defense Donald Rumsfeld should reconsider this request, and if he does not, Congress should restore the cut.

These research and development activities, known as the "technology base" program, are a vital part of the United States defense program. For good reason: the tech base is America's investment in the future. Over the years, tech base activities have yielded advances in scientific and engineering knowledge that have given United States forces the technological superiority that is responsible in large measure for their current dominance in conventional military power.

Research into basic understanding of methods for reducing radar signatures in the 1970's, for example, gave rise to "stealth" technology. Advances in electronic sensor technology enable the vast collection of information from satellites, and past work on computer systems permits distribution of this information in near real-time to military commanders. The combination of near-real-time intelligence and precision munitions are the heart of the so-called "revolution in military affairs" that avoids large and costly systems and approaches.

These advances require years of sustained effort by university, industry and government researchers. If the Pentagon does not make the required investments today, America will not have dominant military technology tomorrow.

The technology base program has also had a major effect on American industry. Indeed, it is the primary reason that the United States leads the world today in information technology. American companies not only draw heavily on the Pentagon's work, but they have also come to depend on it. The research and development programs of many of America's major information technology companies are almost exclusively devoted to product development.

It was the investment of the Defense Advanced Research Projects Agency in a network known as ARPA-net in the 1960's and 70's, for example, that gave rise to the Internet. The JPEG file format for digital images is based on software and standards developed by the Pentagon. The global positioning satellite system, first developed for precision-guided munitions, is now used in many cellphones and has the potential to revolutionize our air traffic control system. America's ability to translate the Pentagon's technology base into commercial achievement is the envy of the world.

Of course, the administration and Congress need to make tough budget choices. But to shift money away from the technology base to pay for Iraq, other current military operations or research on large, expensive initiatives, is to give priority to the near term at the expense of the future. This is doubtful judgment, especially at a time when the nature of the threat confronting America is changing. New threats, like catastrophic terrorism and the spread of weapons of mass destruction, urgently call for new technology.

There should be no doubt that basic research will continue to make a contribution. Robotics, artificial intelligence, biotechnology, brain and cognitive sciences, nanotechnology, large-scale modeling and simulation: all these fields can have a huge impact. If properly supported, basic technology work is likely to lead to unprecedented results.

Mr. Rumsfeld has long championed the need to transform the military and exploit new technology. He has supported the technology base in the past and has urged the adoption of a more long-term view of security needs. He should, then, be willing to review and reverse the Pentagon's request for reducing its technology base. He should understand that short-term budget requirements for the armed services always tend to push out the technology base program - unless the Pentagon leadership supports it.

Perhaps the reason for this year's reduction is the mistaken belief that a one-year gap in financing does not matter, because innovation takes so long. But tech base advances occur because of stable financing. Fluctuating budgets cause wasted effort.

It is possible that Congress will restore the cuts in technology base programs and correspondingly reduce some other part of the defense budget. But Mr. Rumsfeld should not depend on Congress. It would be vastly better if the Pentagon understood the importance of the tech base effort, and acted on that understanding.

The Department of Defense's technology base programs have been an important factor in giving America the dominant military force in the world. They have also helped many American information technology companies become successful. The Pentagon should maintain its dedication to these programs, and that will require leadership from the secretary of defense - as well as support from Congress.

John Deutch, a professor of chemistry at M.I.T., was deputy secretary of defense from 1994 to 1995. William J. Perry was secretary of defense from 1994 to 1997.

All News button
1
-

Cellular prion protein (PrPC) is present in the healthy adult brain. It is a presumably essential membrane protein but its cellular function is unclear. Like Ice-9 - the fictitious water allotrope in Kurt Vonnegut's Cat's Cradle, which "taught the atoms a novel way in which to stack, lock and crystallize until the oceans turned to ice" - cellular prion protein can, in a rare event, adopt a pathogenic and 'contagious' shape, PrPSc, which causes mad cow disease or Bovine Spongiform Encephalopathy (BSE). New variant Creutzfeldt Jakob Disease (vCJD) is the human malady attributed to eating beef tainted with BSE. In comparison to the UK epidemic (at the peak of which 37,280 cases of BSE were reported in the single year 1992), the emergence of four North American mad cows since May 2003 is minor yet still alarming. This work examines the USDA's response to indigenous BSE as manifested in "The Final Rule" (9 CFR 93-96, Jan 4, 2005) and questions whether current regulations are stringent enough to keep PrPSc out of cattle feed and human food.

Sheila Healy is a CISAC Science Fellow. She is currently analyzing USDA policy addressing Bovine Spongiform Encephalopathy (BSE) or mad cow disease. She recently finished a postdoctoral appointment in Stanley Prusiner's laboratory in the Department of Neurology at the University of California, San Francisco. There she studied the molecular and structural requirements for the conversion of cellular prion protein to its pathogenic form, the agent that causes BSE. She holds a doctoral degree in biochemistry and molecular and cellular biology from the University of Arizona.

Reuben W. Hills Conference Room, East 207, Encina Hall

Sheila Healy
Seminars
-

Visions of missile defense have long centered on missile interceptors or lasers, occasionally included the radar "eyes" of a system, and usually ignored the computer "brains" that must inevitably control a system. This talk will examine the causes and consequences of the relative invisibility of computing in missile defense research and policy, examining three historical episodes: the Army's push to deploy a missile defense from 1957-63, the "Safeguard" and "Sentinel" deployment proposals of the late 1960's, and the "Star Wars" controversy of the 1980's. I argue that the problems of missile defense have been defined and tackled in ways that do not merely reflect technical realities. Rather, assessments of missile defense also reflect the social status of some scientists - and the non-status of others - as experts on missile defense. In particular, this talk will show how the contested status of computing as a profession and as a science has shaped assessments of missile defense, and conclude by considering some implications for today.

Reuben W. Hills Conference Room

0
Affiliate
slayton_headshot.jpg PhD

Slayton’s research and teaching examine the relationships between and among risk, governance, and expertise, with a focus on international security and cooperation since World War II. Slayton’s current book project, Shadowing Cybersecurity, examines the historical emergence of cybersecurity expertise. Shadowing Cybersecurity shows how efforts to establish credible expertise in corporate, governmental, and non-governmental contexts have produced varying and sometimes conflicting expert practices. Nonetheless, all cybersecurity experts wrestle with the irreducible uncertainties that characterize intelligent adversaries, and the fundamental inability to prove that systems are secure. The book shows how cybersecurity experts have paradoxically gained credibility by making threats and vulnerabilities visible, while acknowledging that more always remain in the shadows.

Slayton’s first book, Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012 (MIT Press, 2013), shows how the rise of a new field of expertise in computing reshaped public policies and perceptions about the risks of missile defense in the United States. In 2015, Arguments that Count won the Computer History Museum Prize. In 2016, Slayton was awarded a National Science Foundation CAREER grant for her project “Enacting Cybersecurity Expertise.” In 2019, Slayton was also a recipient of the United States Presidential Early Career Award for Scientists and Engineers, for her NSF CAREER project.

CV
Date Label
Rebecca Slayton
Seminars
-

The Energy Security Initiative (ESI) is a proposal to increase the benefits offered to countries in good standing with their NPT Obligations, to compensate for all the new supply restrictions and intrusive safeguards requirements imposed on them. The NPT Balance between benefits to signatories and impositions made on them has eroded through more restrictive interpretations of the NPT. The recently implemented Additional Protocol, the Proliferation Security Initiative (PSI) and the proposals to deny nuclear fuel cycle facilities to countries not yet operating them on the one hand, and the limited supply of low cost nuclear energy available to developing countries on the other hand, demonstrate the need to re-constitute the balance implied in the NPT. It is, in fact, in the self interest of the developed countries, to be able to offer an expanded menu of additional energy benefits to countries whose current scope of available benefits has shrank, while the costs of complying with all new restrictions imposed and proposed has increased. This is the purpose of the ESI, which represents a reinterpretation and expansion of a part of Article IV of the NPT.

This presentation includes a detailed description of what ESI could offer under a new reading of article IV; which countries could qualify as beneficiaries of such program, how much might the total program cost, and how to fund it. A special case dealing with small national enrichment plants in countries such as Iran or Brazil is also considered.

Chaim Braun is a vice president of Altos Management Partners, Inc., and a CISAC science fellow and affiliate. He is a member of the Near-Term Deployment and the Economic Cross-Cut Working Groups of the Department of Energy (DOE) Generation IV Roadmap study. He conducted several nuclear economics-related studies for the DOE Nuclear Energy Office, the Energy Information Administration, the Electric Power Research Institute, the Nuclear Energy Institute, Non-Proliferation Trust International, and others. Braun has worked as a member of Bechtel Power Corporation's Nuclear Management Group, and led studies on power plant performance and economics used to support maintenance services. Braun has worked on a study of safeguarding the Agreed Framework in North Korea, he was the co-leader of a NATO Study of Terrorist Threats to Nuclear Power Plants, led CISAC's Summer Study on Terrorist Threats to Research Reactors, and most recently co-authored an article with CISAC Co-Director Chris Chyba on nuclear proliferation rings. His research project this year is entitled "The Energy Security Initiative and a Nuclear Fuel Cycle Center: Two Enhancement Options for the Current Non-Proliferation Regime."

Reuben W. Hills Conference Room, East 207, Encina Hall

Chaim Braun
Seminars
-

We describe VEGA, a system for analyzing the vulnerability of an electric power grid to physical attacks by terrorists, and for planning mitigation efforts. VEGA (Vulnerability of Electric Grids Analyzer) consists of a bilevel optimization model and solution algorithm, a graphical user interface and a database. The optimization model implements a Stackelberg game in which (a) a group of terrorists attacks components of a power grid ("the system") so as to maximize the amount of load that must be shed (demand for power that goes unmet), and (b) the system operator minimizes that maximum by controlling the degraded system as best possible. We illustrate the basic model using realistic data and show how it can guide a system-upgrade plan to reduce vulnerability.

Actually, we at NPS are using similar techniques to study the vulnerability to attack of a variety of infrastructure systems. This talk will discuss the common approach, and provide two examples: (a) Finding "weak spots" in the Saudi Arabian crude-oil pipeline system and (b) protecting the Washington, DC subway system from a chemical or biological attack.

Dr. Kevin Wood is professor of operations research at the Naval Postgraduate School. At NPS since 1982, he has taught courses in networks and optimization and has published research on network reliability, mathematical programming and its applications, and on interdiction. His 1993 paper "Deterministic Network Interdiction" spurred renewed interest in applying analytical techniques to network and system interdiction, and has led to a series of papers on these topics, by him and by others. He is currently applying the methodology to critical infrastructure protection in general, and electric power grids in particular: Professor Wood has long-term research support from the Office of Naval Research as well as the Air Force of Scientific Research, and has been a visiting professor at Stanford University, the National Security Agency and the University of Auckland.

Reuben W. Hills Conference Room, East 207, Encina Hall

Kevin Wood Professor of Operations Research Naval Postgraduate School
Seminars
-

Many critiques have been made of the U.S. Intelligence Community's performance in thwarting terrorist attacks (i.e. 9/11) and understanding the proliferation of WMD (i.e. Iraq). Given the reports from the 9/11 and WMD commissions as well as last year's legislation establishing the position of National Intelligence Director, what in fact are the deficiencies of the Intelligence Community and what changes have the best chance of correcting them and preventing future intelligence failures?

This seminar will feature a panel discussion by three experts on intelligence issues. They will focus their comments on the issues, challenges, and potential solutions for improving the U.S. Intelligence Community capabilities to provide timely warning and accurate assessments of future threats. They will then invite comments, questions, and discussion.

Sidney Drell is a professor of theoretical physics (Emeritus) at the Stanford Linear Accelerator Center and a senior fellow at the Hoover Institution. As a physicist and arms control specialist, he has been a leader in providing essential technical advice to the U.S. Government on national security issues. He is an active member of JASON, a group of distinguished scientists, and has served on a number of boards, including the President's Foreign Intelligence Advisory Board, the President's Science Advisory Committee, and the Non-Proliferation Advisory Panel.

Keith Hansen is a consulting professor of international relations teaching courses on U.S. intelligence and arms control/proliferation. His 35-year government career included seven years on the National Intelligence Council, where he managed numerous national intelligence estimates and other interagency studies on strategic and nuclear issues, and where he served as the National Intelligence Officer for Strategic Programs and Nuclear Proliferation.

Henry Rowen is Director Emeritus of the Asia/Pacific Research Center, professor of public policy and management (emeritus) at Stanford's Graduate School of Business, and senior fellow at the Hoover Institution. He was Assistant Secretary of Defense for International Security Affairs in the Department of Defense (1989-1991), Chairman of the DCI's National Intelligence Council (1981-1983), President of RAND Corporation (1968-1972), and Assistant Director of the U.S. Bureau of the Budget (1965-1966). Most recently, he was a Member of the President's Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction.

Reuben W. Hills Conference Room

Henry S. Rowen Speaker
Keith Hansen Visiting professor of international relations Speaker
Sidney D. Drell Professor of theoretical physics (Emeritus) Speaker Stanford University
Seminars
Subscribe to International Development